Abstract

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>

Highlights

  • In the recent century, information technology has created the ability to electronically store and transfer health information to improve the quality of health care and increase the effectiveness and efficiency of health care services organization (Zhang et al, 2010, pp. 268-275; Mehraeen et al, 2016, p. 47)

  • Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security

  • Improvements: Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues many involved events such as Hybrid Execution Model, Vehicular Cloud Computing (VCC)-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches have to be defined for using cloud computing threat management processes

Read more

Summary

Introduction

Information technology has created the ability to electronically store and transfer health information to improve the quality of health care and increase the effectiveness and efficiency of health care services organization (Zhang et al, 2010, pp. 268-275; Mehraeen et al, 2016, p. 47). Health information should be available to authorized healthcare providers (including researchers who are trying to find the causes, treatments, and cure patients) (Alnuem et al, 2011). Current developments in remote healthcare system, has been influenced by the development of IT industry and it will provide health services everywhere and in an easy way. These systems provide a platform for sharing www.ccsenet.org/gjhs. Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. Security concerns in cloud computing environment are a matter of challenge with rising importance

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call